VirSCAN VirSCAN

1, You can UPLOAD any files, but there is 20Mb limit per file.
2, VirSCAN supports Rar/Zip decompression, but it must be less than 20 files.
3, Aplikace VirSCAN může skenovat komprimované soubory s heslem 'infected'nebo'virus'.

Language
Server load
Server Load

File information
Safety rating:17
Behavior list
Basic Information
MD5:5b8bc92296c2fa60fecc6316ad73f1e2
file type:EXE
Production company:
version:
Shell or compiler information:PACKER:UPX 0.89.6 - 1.02 / 1.05 - 1.24 -> Markus & Laszlo
Subfile information:upx_c_f689b95ddumpFile / bfaed650f424b73e0119bf13ef073ee7 / EXE
Key behavior
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Behavior description:获取TickCount值
details:TickCount = 5429671, SleepMilliseconds = 500.
TickCount = 5429734, SleepMilliseconds = 500.
TickCount = 5429615, SleepMilliseconds = 100.
TickCount = 5429631, SleepMilliseconds = 100.
TickCount = 5609640, SleepMilliseconds = 180000.
TickCount = 5435043, SleepMilliseconds = 200.
TickCount = 5435206, SleepMilliseconds = 300.
TickCount = 5440481, SleepMilliseconds = 200.
TickCount = 5440715, SleepMilliseconds = 200.
TickCount = 5446106, SleepMilliseconds = 200.
TickCount = 5446340, SleepMilliseconds = 200.
TickCount = 5451668, SleepMilliseconds = 200.
TickCount = 5453703, SleepMilliseconds = 2000.
TickCount = 5457200, SleepMilliseconds = 200.
TickCount = 5457762, SleepMilliseconds = 200.
Behavior description:创建系统服务
details:[服务创建成功]: 15654656, C:\WINDOWS\cclzys.exe
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
Process behavior
Behavior description:隐藏窗口创建进程
details:ImagePath = , CmdLine = at \\**.133.40.** 12:11 admin$\
ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
Behavior description:创建进程
details:[0x00000a00]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000a08]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
[0x00000a10]ImagePath = C:\WINDOWS\system32\cmd.exe, CmdLine = "C:\WINDOWS\system32\cmd.exe" /c del C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe > nul
[0x00000a4c]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000b10]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000b58]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000b94]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000bd0]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
[0x00000c10]ImagePath = C:\WINDOWS\system32\at.exe, CmdLine = at \\**.133.40.** 12:11 admin$\
Behavior description:创建新文件进程
details:[0x000009c8]ImagePath = C:\WINDOWS\cclzys.exe, CmdLine = C:\WINDOWS\cclzys.exe
Behavior description:创建本地线程
details:TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2512, StartAddress = 77DC3519, Parameter = 00186BB8
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2516, StartAddress = 00402DD5, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2520, StartAddress = 004051E0, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2524, StartAddress = 00405241, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2528, StartAddress = 0040387C, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2532, StartAddress = 00405184, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2536, StartAddress = 00405128, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2540, StartAddress = 00404908, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2544, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2620, StartAddress = 00404908, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2624, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2796, StartAddress = 00404908, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2812, StartAddress = 004040DA, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2892, StartAddress = 00404908, Parameter = 00000000
TargetProcess: cclzys.exe, InheritedFromPID = 656, ProcessID = 2504, ThreadID = 2924, StartAddress = 004040DA, Parameter = 00000000
Behavior description:进程提权信息
details:NT AUTHORITY\SYSTEM
File behavior
Behavior description:创建文件
details:C:\WINDOWS\cclzys.exe
C:\WINDOWS\system32\cclzys.exe
Behavior description:创建可执行文件
details:C:\WINDOWS\cclzys.exe
C:\WINDOWS\system32\cclzys.exe
Behavior description:覆盖已有文件
details:C:\WINDOWS\system32\cclzys.exe
Behavior description:复制文件
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe ---> C:\WINDOWS\cclzys.exe
C:\WINDOWS\cclzys.exe ---> \\**.133.40.**\admin$\g1fd.exe
Behavior description:查找文件
details:FileName = C:\Documents and Settings
FileName = C:\Documents and Settings\Administrator
FileName = C:\Documents and Settings\Administrator\Local Settings
FileName = C:\Documents and Settings\Administrator\My Documents
FileName = C:\Documents and Settings\All Users
FileName = C:\Documents and Settings\All Users\Documents
FileName = C:\Documents and Settings\Administrator\桌面
FileName = C:\Documents and Settings\All Users\桌面
FileName = C:\WINDOWS
FileName = C:\WINDOWS\system32
FileName = C:\WINDOWS\system32\cmd.exe
FileName = C:\WINDOWS\system32\at.exe
FileName = C:\Documents and Settings\Administrator\Local Settings\Temp
FileName = C:\Documents and Settings\Administrator\Local Settings\%temp%
FileName = C:\DOCUME~1\ADMINI~1\LOCALS~1\%temp%\****.exe
Behavior description:修改文件内容
details:C:\WINDOWS\cclzys.exe ---> Offset = 0
C:\WINDOWS\cclzys.exe ---> Offset = 4096
C:\WINDOWS\cclzys.exe ---> Offset = 8192
C:\WINDOWS\cclzys.exe ---> Offset = 12288
C:\WINDOWS\system32\cclzys.exe ---> Offset = 0
C:\WINDOWS\system32\cclzys.exe ---> Offset = 4096
C:\WINDOWS\system32\cclzys.exe ---> Offset = 8192
C:\WINDOWS\system32\cclzys.exe ---> Offset = 12288
Behavior description:自删除
details:C:\Documents and Settings\Administrator\Local Settings\%temp%\****.exe
Network behavior
Behavior description:建立到一个指定的套接字连接
details:URL: ww****om, IP: **.133.40.**:1988, SOCKET = 0x000000ec
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000138
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000160
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000118
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000158
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000148
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000150
URL: aa****om, IP: **.133.40.**:9533, SOCKET = 0x00000138
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x00000148
URL: ww****om, IP: **.133.40.**:9999, SOCKET = 0x0000011c
Behavior description:按名称获取主机地址
details:gethostbyname: computer
gethostbyname: ww****om
DnsQuery_W: 1.110.110.110.in-addr.arpa.
gethostbyname: aa****om
DnsQuery_W: 2.110.110.110.in-addr.arpa.
DnsQuery_W: 3.110.110.110.in-addr.arpa.
DnsQuery_W: 4.110.110.110.in-addr.arpa.
DnsQuery_W: 5.110.110.110.in-addr.arpa.
DnsQuery_W: 6.110.110.110.in-addr.arpa.
DnsQuery_W: 7.110.110.110.in-addr.arpa.
Other behavior
Behavior description:创建互斥体
details:CTF.LBES.MutexDefaultS-*
CTF.Compart.MutexDefaultS-*
CTF.Asm.MutexDefaultS-*
CTF.Layouts.MutexDefaultS-*
CTF.TMD.MutexDefaultS-*
CTF.TimListCache.FMPDefaultS-*MUTEX.DefaultS-*
15654656
Local\ZonesCounterMutex
Local\ZoneAttributeCacheCounterMutex
Local\ZonesCacheCounterMutex
Local\ZonesLockedCacheCounterMutex
Behavior description:启动系统服务
details:[服务启动成功]: LocalSystem, 456876, C:\WINDOWS\cclzys.exe
Behavior description:获取TickCount值
details:TickCount = 5429671, SleepMilliseconds = 500.
TickCount = 5429734, SleepMilliseconds = 500.
TickCount = 5429615, SleepMilliseconds = 100.
TickCount = 5429631, SleepMilliseconds = 100.
TickCount = 5609640, SleepMilliseconds = 180000.
TickCount = 5435043, SleepMilliseconds = 200.
TickCount = 5435206, SleepMilliseconds = 300.
TickCount = 5440481, SleepMilliseconds = 200.
TickCount = 5440715, SleepMilliseconds = 200.
TickCount = 5446106, SleepMilliseconds = 200.
TickCount = 5446340, SleepMilliseconds = 200.
TickCount = 5451668, SleepMilliseconds = 200.
TickCount = 5453703, SleepMilliseconds = 2000.
TickCount = 5457200, SleepMilliseconds = 200.
TickCount = 5457762, SleepMilliseconds = 200.
Behavior description:调整进程token权限
details:SE_LOAD_DRIVER_PRIVILEGE
SE_INC_BASE_PRIORITY_PRIVILEGE
Behavior description:打开事件
details:Global\SvcctrlStartEvent_A3752DX
HookSwitchHookEnabledEvent
_fCanRegisterWithShellService
\SECURITY\LSA_AUTHENTICATION_INITIALIZED
Behavior description:可执行文件签名信息
details:C:\WINDOWS\cclzys.exe(签名验证: 未通过)
C:\WINDOWS\system32\cclzys.exe(签名验证: 未通过)
Behavior description:调用Sleep函数
details:[1]: MilliSeconds = 500.
[2]: MilliSeconds = 500.
[3]: MilliSeconds = 200.
[4]: MilliSeconds = 100.
[5]: MilliSeconds = 100.
[6]: MilliSeconds = 100.
[7]: MilliSeconds = 100.
[8]: MilliSeconds = 180000.
[9]: MilliSeconds = 180000.
[10]: MilliSeconds = 200.
Behavior description:可执行文件MD5
details:C:\WINDOWS\cclzys.exe ---> 5b8bc92296c2fa60fecc6316ad73f1e2
C:\WINDOWS\system32\cclzys.exe ---> 5b8bc92296c2fa60fecc6316ad73f1e2
Behavior description:打开互斥体
details:Local\!IETld!Mutex
ShimCacheMutex
Behavior description:创建系统服务
details:[服务创建成功]: 15654656, C:\WINDOWS\cclzys.exe
Run screenshot
VirSCAN

About VirSCAN | Privacy Policy | Contact us | Links | Help VirSCAN
中国反网络病毒联盟
Powered By CentOSpol

京ICP备11007605号-12

pol

京公网安备 11010802020746号